2019
DOI: 10.1007/978-3-030-15462-2_4
|View full text |Cite
|
Sign up to set email alerts
|

Non-profiled Mask Recovery: The Impact of Independent Component Analysis

Abstract: As one of the most prevalent SCA countermeasures, masking schemes are designed to defeat a broad range of side channel attacks. An attack vector that is suitable for low-order masking schemes is to try and directly determine the mask(s) (for each trace) by utilising the fact that often an attacker has access to several leakage points of the respectively used mask(s). Good examples for implementations of loworder masking schemes are the based on table re-computations and also the masking scheme in DPAContest V4… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 17 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?